Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
security_key_lifecycle_manager Vendor: ibm

About This Product

security_key_lifecycle_manager is a software product offered by ibm. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 70 known vulnerabilities affecting ibm security_key_lifecycle_manager. This includes 4 critical-severity issues and 16 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2017 to 2023, indicating a sustained research interest and ongoing security attention. 44 medium-severity issues and 6 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2016-6105 2017-02-01 2025-04-20 8.2 6.4 Likely
CVE-2016-6117 2017-02-01 2025-04-20 5.3 5.0 Likely
CVE-2016-6095 2017-02-02 2025-04-20 9.8 5.0 Likely
CVE-2016-6099 2017-02-02 2025-04-20 5.3 5.0 Likely
CVE-2016-6103 2017-02-02 2025-04-20 8.8 6.8 Likely
CVE-2016-6116 2017-02-02 2025-04-20 5.9 4.3 Likely
CVE-2016-6092 2017-02-07 2025-04-20 6.2 2.1 Unknown
CVE-2016-6094 2017-02-07 2025-04-20 4.3 4.0 Likely
CVE-2016-6096 2017-02-07 2025-04-20 6.1 4.3 Likely
CVE-2016-6097 2017-02-07 2025-04-20 4.0 2.1 Unknown
CVE-2016-6104 2017-02-07 2025-04-20 7.2 6.5 Likely
CVE-2016-6102 2017-03-27 2025-04-20 3.7 4.3 Likely
CVE-2016-6093 2017-06-08 2025-04-20 9.8 5.0 Likely
CVE-2016-6098 2017-06-08 2025-04-20 8.1 5.5 Likely
CVE-2017-1664 2018-01-04 2024-11-21 5.9 4.3 Likely
CVE-2017-1665 2018-01-04 2024-11-21 5.9 4.3 Likely
CVE-2017-1669 2018-01-04 2024-11-21 3.7 4.3 Likely
CVE-2017-1672 2018-01-04 2024-11-21 8.8 6.8 Likely
CVE-2017-1673 2018-01-04 2024-11-21 6.1 4.3 Likely
CVE-2017-1727 2018-01-04 2024-11-21 4.3 4.0 Likely
CVE-2017-1666 2018-01-09 2024-11-21 8.1 5.5 Likely
CVE-2017-1668 2018-01-09 2024-11-21 6.1 5.8 Likely
CVE-2017-1670 2018-01-09 2024-11-21 9.8 7.5 Likely
CVE-2017-1671 2018-01-09 2024-11-21 7.5 5.0 Likely
CVE-2014-0872 2018-04-25 2024-11-21 4.1 1.5 Unknown
CVE-2018-1741 2018-10-08 2024-11-21 6.5 6.4 Likely
CVE-2018-1742 2018-10-08 2024-11-21 5.9 7.2 Unknown
CVE-2018-1743 2018-10-08 2024-11-21 5.3 5.0 Likely
CVE-2018-1749 2018-10-08 2024-11-21 4.3 4.0 Likely
CVE-2018-1750 2018-10-08 2024-11-21 4.2 5.5 Likely
CVE-2018-1753 2018-10-08 2024-11-21 4.3 4.0 Likely
CVE-2018-1738 2018-10-11 2024-11-21 7.1 5.5 Likely
CVE-2018-1745 2018-10-11 2024-11-21 7.5 7.8 Likely
CVE-2018-1744 2018-10-15 2024-11-21 7.7 4.0 Likely
CVE-2018-1747 2018-10-15 2024-11-21 7.1 5.5 Likely
CVE-2018-1751 2019-01-23 2024-11-21 5.9 5.0 Likely
CVE-2019-4565 2019-09-20 2024-11-21 7.5 5.0 Likely
CVE-2019-4515 2019-09-24 2024-11-21 6.5 4.3 Likely
CVE-2019-4566 2019-09-24 2024-11-21 5.5 2.1 Unknown
CVE-2019-4514 2019-10-04 2024-11-21 5.3 5.0 Likely
CVE-2019-4564 2019-10-04 2024-11-21 6.1 4.3 Likely
CVE-2020-4567 2020-07-29 2024-11-21 9.8 5.0 Likely
CVE-2020-4569 2020-07-29 2024-11-21 6.5 6.4 Likely
CVE-2020-4572 2020-07-29 2024-11-21 5.3 5.0 Likely
CVE-2020-4573 2020-07-29 2024-11-21 5.3 5.0 Likely
CVE-2020-4574 2020-07-29 2024-11-21 7.5 5.0 Likely
CVE-2020-4568 2020-11-10 2024-11-21 5.5 2.1 Unknown
CVE-2020-4845 2020-12-17 2024-11-21 5.4 3.5 Unknown
CVE-2020-4846 2020-12-17 2024-11-21 2.7 4.0 Likely
CVE-2021-38972 2021-11-12 2024-11-21 4.3 4.0 Likely
CVE-2021-38973 2021-11-12 2024-11-21 2.7 4.0 Likely
CVE-2021-38985 2021-11-12 2024-11-21 4.3 4.0 Likely
CVE-2021-38974 2021-11-15 2024-11-21 6.5 4.0 Likely
CVE-2021-38975 2021-11-15 2024-11-21 6.5 4.0 Likely
CVE-2021-38976 2021-11-15 2024-11-21 5.5 2.1 Unknown
CVE-2021-38977 2021-11-15 2024-11-21 4.3 4.3 Likely
CVE-2021-38978 2021-11-15 2024-11-21 5.9 4.3 Likely
CVE-2021-38979 2021-11-15 2024-11-21 7.5 5.0 Likely
CVE-2021-38981 2021-11-15 2024-11-21 5.3 5.0 Likely
CVE-2021-38982 2021-11-15 2024-11-21 5.4 3.5 Unknown
CVE-2021-38983 2021-11-15 2024-11-21 7.5 5.0 Likely
CVE-2021-38984 2021-11-15 2024-11-21 7.5 5.0 Likely
CVE-2021-38980 2021-11-23 2024-11-21 5.3 5.0 Likely
CVE-2023-25687 2023-03-21 2024-11-21 4.3 - -
CVE-2023-25689 2023-03-21 2024-11-21 2.7 - -
CVE-2023-25686 2023-03-21 2024-11-21 6.2 - -
CVE-2023-25923 2023-03-21 2024-11-21 2.7 - -
CVE-2023-25684 2023-03-21 2024-11-21 6.5 - -
CVE-2023-25688 2023-03-22 2024-11-21 4.3 - -
CVE-2023-25924 2023-03-22 2024-11-21 5.4 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for ibm security_key_lifecycle_manager by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.